4 c It w Ethical Legal Issues

download 4 c It w Ethical Legal Issues

of 31

Transcript of 4 c It w Ethical Legal Issues

  • 8/10/2019 4 c It w Ethical Legal Issues

    1/31

    Computing and IT in the WorkplaceCT006-1

    Ethical & Legal Issues

  • 8/10/2019 4 c It w Ethical Legal Issues

    2/31

    CT024 PDT Introduction 2

    Learning Outcomes

    At the end of this section, YOU should be able to:

    To explain and describe the common issues that arises inthe use of computing

    To explain and discuss the steps that can be taken toensure proper use of IT

  • 8/10/2019 4 c It w Ethical Legal Issues

    3/31

    CT024 PDT Introduction 3

    Topics we will cover

    Ethics and Society

    Unauthorized use of computers & networks

    Software theft

    Information privacy

    Code of Conduct Spyware and Spam

  • 8/10/2019 4 c It w Ethical Legal Issues

    4/31

    CT024 PDT Introduction 4

    Ethics and Society

    What are computer ethics ?

    Informationprivacy

    Intellectual propertyrights rights to which

    creators are entitledfor their work

    Software theft Information

    accuracy

    Codes ofconduct

    Unauthorizeduse of computers

    and networks

    Moral guidelines that govern use of computers and informationsystems

  • 8/10/2019 4 c It w Ethical Legal Issues

    5/31

    CT024 PDT Introduction 5

    Unauthorized Access and Use

    What is unauthorized access and how is itachieved?

    Use of a computer ornetwork without permission

    Hackers typically break into computer byconnecting to it and then logging in as a

    legitimate user

    Hacker or cracker, is someone whotries to access a computer

    or network illegally

  • 8/10/2019 4 c It w Ethical Legal Issues

    6/31

    CT024 PDT Introduction 6

    Unauthorized Access and Use

    How can companies protect againsthackers?Intrusion detection software

    analyzes network traffic, assessessystem vulnerabilities, and identifiesintrusions and suspicious behavior

    Access control defines who

    can access computer andwhat actions they can take

    Audit trail recordsaccess attempts

  • 8/10/2019 4 c It w Ethical Legal Issues

    7/31CT024 PDT Introduction 7

    Hardware Theft and Vandalism What are hardware theft and hardware vandalism?

    Hardware theft is the act ofstealing computer equipment

    Cables used to lock equipmentSome notebook computers usepasswords, possessed objects,and biometrics as securitymethods

    For PDAs, you can password-protect the deviceHardware vandalism is the act ofdefacing or destroying computer

    equipment

  • 8/10/2019 4 c It w Ethical Legal Issues

    8/31CT024 PDT Introduction 8

    Software Theft

    What is software theft ?

    Act of stealing orillegally copying

    software orintentionallyerasing

    programs

    Software piracyis illegal duplication

    of copyrightedsoftware

  • 8/10/2019 4 c It w Ethical Legal Issues

    9/31CT024 PDT Introduction

    Software Piracy Software piracy - unauthorized copying or

    distribution of copyrighted software. How? By copying, downloading, sharing, selling or

    installing multiple copies onto computers. People don't realize that when you purchase

    software, you are actually purchasing a licenseto use it, not the actual software.

    That license tells you how many times you caninstall the software, so it's important to read it. Ifyou make more copies of the software than the

    license permits, you are pirating. 9

  • 8/10/2019 4 c It w Ethical Legal Issues

    10/31CT024 PDT Introduction 10

    Software Theft

    What is a license agreement ?

    Right to use softwareSingle-user license agreement allows user to installsoftware on one computer, make backup copy.

  • 8/10/2019 4 c It w Ethical Legal Issues

    11/31CT024 PDT Introduction 11

    Software Theft

    What are some other safeguards against

    software theft?

    Product activation allows user toinput product identification number

    online or by phone and receive uniqueinstallation identification number

    Business Software Alliance

    (BSA) promotes betterunderstanding of software

    piracy problems

  • 8/10/2019 4 c It w Ethical Legal Issues

    12/31CT024 PDT Introduction

    BSA

    The Software Alliance is a nonprofittrade association to advance the goals of thesoftware industry and its hardware partners,dedicated to promoting a safe and legal digitalworld. Amongst its goals are: Protecting intellectual property (copyright,

    patents, tech mandates) Opening markets to barrier-free trade Data security

    12

  • 8/10/2019 4 c It w Ethical Legal Issues

    13/31CT024 PDT Introduction 13

    Information Theft What is encryption ?

    Safeguards against information theftProcess of converting plaintext (readable data) into ciphertext (unreadable characters)Encryption key (formula) often uses more than one methodTo read the data, recipient must decrypt or decipher the data

  • 8/10/2019 4 c It w Ethical Legal Issues

    14/31CT024 PDT Introduction 14

    Information Theft

    What does an encrypted file look like?

  • 8/10/2019 4 c It w Ethical Legal Issues

    15/31CT024 PDT Introduction 15

    IT Code of Conduct What is an IT code of conduct ?

    Written guidelines that determine if computer actionis ethicalEmployers can distribute to employees

    IT CODE OF CONDUCT

  • 8/10/2019 4 c It w Ethical Legal Issues

    16/31

    CT024 PDT Introduction 16

    Information Privacy What is information privacy ?

    Legal for employers to use

    monitoring software programs

    Difficult to maintain today because data is stored onlineEmployee monitoring is using

    computers to observe employeecomputer use

    Right of individuals andcompanies to restrict collection

    and use of information about them

  • 8/10/2019 4 c It w Ethical Legal Issues

    17/31

    CT024 PDT Introduction 17

    Information Privacy What are some ways to safeguard personal

    information?

    Fill in necessary informationon rebate, warranty, and

    registration forms

    Avoid shopping cluband buyers cards

    Install a cookie managerto filter cookies

    Inform merchants that youdo not want them to distribute

    your personal information

    Limit the amount of informationyou provide to Web sites; fillin only required information

    Clear your history file whenyou are finished browsing

    Set up a free e-mailaccount;

    use this e-mail address formerchant forms

    Turn off file and printsharing

    on your Internet connection

    Install a personal firewall

    Sign up for e-mailfiltering through your

    Internet service provider oruse an antispam program,

    such as Brightmail

    Do not reply to spamfor any reason

    Surf the Web anonymouslywith a program such asFreedom Web Secure orthrough an anonymous

    Web site such as

    Anonymizer.com

  • 8/10/2019 4 c It w Ethical Legal Issues

    18/31

    CT024 PDT Introduction

    What is Anonymizer.com

    Is a proxy server that makes Internetactivity untraceable. It protects personallyidentifying information by hiding privateinformation on the user's behalf

    When users anonymize their personalinformation it can enable:1. Risk minimization

    2. Taboo electronic communications3. Identity theft prevention4. Protection of search history

    18

  • 8/10/2019 4 c It w Ethical Legal Issues

    19/31

    CT024 PDT Introduction 19

    Information Privacy

    Data collected when you fill out form on WebMerchants sellyour electronic

    profileOften you canspecify whetheryou wantpersonalinformationdistributed

    What is an electronic profile ?

  • 8/10/2019 4 c It w Ethical Legal Issues

    20/31

    CT024 PDT Introduction 20

    Information Privacy What is a cookie ?

    Set browser toaccept cookies,prompt you toaccept cookies,

    or disablecookies

    Some Websites sell or

    tradeinformation

    stored in yourcookies

    Small file onyour computerthat contains

    data about youUser

    preferences

    Interests andbrowsing

    habits

    Howregularlyyou visitWeb sites

  • 8/10/2019 4 c It w Ethical Legal Issues

    21/31

    CT024 PDT Introduction 21

    Information Privacy How do cookies work? Step 1. When you type aWeb address of a Web sitein your browser window,the browser programsearches your hard diskfor a cookie associatedwith the Web site.

    Step 3. If the Web site does notreceive the cookie info and isexpecting it, the Web site createsan identification number for youin its database and sends thatnumber to your browser. Browserin turn creates a cookie file basedon that number and stores cookiefile on your hard disk. The Website now can update info in cookie

    files whenever you access the site.

    Web server forwww.company.c

    om

    Step 2. If thebrowser finds acookie, it sends theinformation incookie file to theWeb site.

  • 8/10/2019 4 c It w Ethical Legal Issues

    22/31

    CT024 PDT Introduction 22

    Information Privacy

    What is a cookiemanager ?

    Software

    programthatselectivelyblockscookies

  • 8/10/2019 4 c It w Ethical Legal Issues

    23/31

    CT024 PDT Introduction 23

    Information Privacy

    Spyware is programplaced on computerwithout usersknowledge

    Secretly collectsinformationabout the user

    Spam is unsolicitede-mail message sentto many recipients

    h

  • 8/10/2019 4 c It w Ethical Legal Issues

    24/31

    CT024 PDT Introduction

    What is Spyware

    A general term used to describe software

    that performs certain behaviors without obtainingyour consent, such as:a) Advertising & Collecting personal information

    b) Changing the configuration of your computer Often associated with software that displays

    advertisements (called adware) or software that

    tracks personal or sensitive information. It can change your computer, causing it to slow

    down/crash; change your web browser's

    home/search page 24

  • 8/10/2019 4 c It w Ethical Legal Issues

    25/31

    CT024 PDT Introduction 25

    Information Privacy

    How can you control spam ?

    Collects spam incentral location

    that you canview any time

    Service thatblocks e-mail

    messages fromdesignated

    sources

    E -mail filtering

    Sometimesremoves valid

    e-mail messages

    Attempts toremove spam

    Anti -spam program

  • 8/10/2019 4 c It w Ethical Legal Issues

    26/31

    CT024 PDT Introduction 26

    Privacy Law

    What privacy laws have been enacted?

  • 8/10/2019 4 c It w Ethical Legal Issues

    27/31

    CT024 PDT Introduction 27

    Privacy Law

    What privacy laws have been enacted? (contd)

  • 8/10/2019 4 c It w Ethical Legal Issues

    28/31

    CT024 PDT Introduction 28

    Content FilteringProcess of restricting access to certain material

    ternet Contentating Association

    ICRA) providesting system ofeb contenteb filtering

    oftware restrictsccess to specifiedites

  • 8/10/2019 4 c It w Ethical Legal Issues

    29/31

    CT024 PDT Introduction 29

    Review Questions

    What are the issues surroundinginformation privacy?Explain the process of encryption and

    discuss on why this process is needed.How to prevent unauthorized computeraccess and discuss the implicationsbased on the case study given.

  • 8/10/2019 4 c It w Ethical Legal Issues

    30/31

    CT024 PDT Introduction 30

    Q & A

    Question and Answer Session

  • 8/10/2019 4 c It w Ethical Legal Issues

    31/31

    Topic and Structure of next session

    Security Issues

    What we will cover next